GLOBAL ICS & IIOT RISK REPORT

A data-driven analysis of vulnerabilities in real-world OT networks based on analyzing 375 industrial control networks via Network Traffic Analysis (NTA), across multiple industrial sectors in the US, EMEA and APAC.

Complete situational awareness of industrial malware and targeted threats that can lead to operational disruption and theft of corporate IP. Uses passive Network Traffic Analysis (NTA) of ICS protocols with ICS-specific behavioral analytics and threat intelligence.

Agentless technology that’s deployed in less than an hour and has zero impact on the OT network. Uses machine learning to eliminate need for rules or signatures. Supports any ICS vendor, industrial protocol & SIEM.

Many industrial organizations are now implementing modernization initiatives requiring increased connectivity between IT and OT networks. But IT/OT convergence also leads to a larger attack surface and increased cyber-risk.

Supported Vendors

OT networks are comprised of machines communicating with each other, which makes their behavior highly deterministic.

CyberX uses patent-pending, M2M behavioral analytics to model ICS networks as deterministic sequences of states and transitions, a technique known as Industrial Finite State Modeling (IFSM). This unique machine learning technology enables the CyberX platform to immediately detect any anomalous or unauthorized activity with minimal false positives.

Combined with other analytics and proprietary ICS threat intelligence, IFSM enables rapid detection of industrial malware such as NotPetya, BlackEnergy and Havex; targeted attacks such as unauthorized program execution on PLCs; and vulnerabilities such as unauthorized remote access and device misconfigurations.